![]() The code generated by the library was written by José Valim. Now, we tend to be skeptical when it comes to generated code, but this is different. By using the library, we can generate a complete authentication system that follows all the best practices. Good thing there’s a library to rescue us from this daunting mission. It’s no surprise then that the automated tests themselves are the biggest chunk of code in a secure authentication system. One small regression could result in sensitive data being compromised. Because when it comes to authentication, everything is on the line. Generating, verifying, and expiring time-based tokensĪvoiding session fixation and timing attacksĪll the reasons you got into programming in the first place, right?Įvery scenario. That generally involves techniques such as: Our legal team reminded us that we need to remind you: The authentication system must be secure!īasically that means you have to 1) think like a hacker and 2) set up defenses to block all their potential malicious moves. User registration with email confirmation □ And users will expect some standard features, including: That’s why it’s called an authentication system. There’s a lot of moving parts behind the scenes to make this work. Then once you have an account and you’re logged in, you can access the LiveView to get your next super-secret mission. Yep, anyone can join our secret intelligence service: □️♀️ Suppose we need a secure way for a clandestine team of agents to get their super-secret missions.įirst, to access the LiveView page that displays your next mission, you have to be logged in:ĭon’t have an account? No problem. Here’s a top-secret example we’ve been working on. Sooner or later, you’re going to need a secure authentication system that works seamlessly with LiveView. It’s a must-have requirement for any application that has members-only features. Authentication isn’t in the nice-to-have column of your project requirements. So if you requested authentication, this one’s for you! □Īnd we totally get why it’s a popular request. It’s literally everybody’s most desired song right now. ![]() Well, you’ve lit up our request line wanting to hear about LiveView authentication. So what’s all this got to do with our next LiveView example? Wow, that made you feel special! They actually played your song for you! announce “This one’s for Mike…” right before playing your favorite jam. “Can you please play Who Are You by The Who?” Then you’d wait…Īnd if you were really lucky, within the next 30 minutes you’d hear the station’s D.J. You’d dial the station’s telephone number (on a landline, of course) and request a song you wanted to hear. It sounds so quaint now, but it was super cool back then. In the days before you could play any song you wanted at any time, you would call in to a radio station and request a song. This week we have an update on the next example that’s in the works.īut first, let’s roll back the clock two decades… Hopefully you’ve had a chance to check out the mapping and charting examples. We’re back with another LiveView Pro course update!
0 Comments
Leave a Reply. |